Normal behavior:
Round counters should use appropriately sized types and include overflow protection for data integrity.
Specific issue:
The contract uses uint256
for gameRound
which increments indefinitely without bounds checking or overflow protection.
Likelihood:
Overflow is extremely unlikely but theoretically possible with automated systems running indefinitely.
Impact:
Round tracking would reset to 0, causing confusion and breaking analytics.
Historical round data becomes incorrect.
Gas inefficiency from using oversized storage type.
The following test demonstrates the unbounded round counter increment:
Use a smaller, more appropriate data type and add overflow protection:
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.